Loading…
Unlock the Power of IBM i at POWERUp 2025!

Join us in Disneyland, California, for POWERUp 2025, the premier conference for IBM i professionals. Whether you’re an experienced expert or just starting your IBM i journey, this event offers unparalleled education, hands-on workshops, and valuable networking opportunities. Stay ahead of the curve with insights from industry leaders, explore the latest innovations, and connect with a thriving community that shares your passion for IBM i. Don’t miss this opportunity to expand your knowledge, grow your skills, and power up your career!

Type: Security clear filter
arrow_back View All Dates
Wednesday, May 21
 

8:00am PDT

Best Practices for the IBM i Security Administrator
Wednesday May 21, 2025 8:00am - 10:15am PDT
Know you should be managing your IBM i Security implementation but don’t know where to start or what all needs to be checked? This session will provide you with a checklist of the areas of the operating system that should be checked on a regular basis. Carol and Steve will explain why it’s important to perform these checks along with the risks of not maintaining your security configuration. The Run SQL Script file used during the demo will be provided with the handouts.
 
Speakers
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco Systems
With over 30 years' experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →
avatar for Steve Riedmueller

Steve Riedmueller

Certified IBM i Admin - IBM Champion, Speaker, Mentor, and Advocate, Kisco
Wednesday May 21, 2025 8:00am - 10:15am PDT
Room 8 1150 Magic Way, Anaheim, CA 92802

10:45am PDT

Building a Successful IFS Security Strategy
Wednesday May 21, 2025 10:45am - 11:45am PDT
Ask any security professional which area of IBM i security is most often ignored and chances are the unanimous response is a chorus of “the Integrated File System."

Many organizations are either unaware of the risks that an unsecured IFS poses or are simply unsure of how to secure it. Regardless of the reason, this is a problem. The system interface doesn’t differentiate how a user profile accesses data – which leaves sensitive data exposed and vulnerable to manipulation, malware, and even theft.
Speakers
avatar for Sandi Moore

Sandi Moore

Sr. Solutions Engineer, Fortra LLC
Sandi has been working with Fortra customers for over 20 years supporting systems monitoring and security software. With experience on IBM i, AIX, and Linux, she has been involved in product demonstrations, implementation, support, training, research, and product testing. Sandi is... Read More →
Wednesday May 21, 2025 10:45am - 11:45am PDT
Room 8 1150 Magic Way, Anaheim, CA 92802

3:45pm PDT

Audit Journaling with Navigator for i
Wednesday May 21, 2025 3:45pm - 4:45pm PDT
Understand how Navigator for i makes audit journaling on the IBM i easy. Learn how Navigator simplifies configuring auditing to just a few button clicks. See how Navigator can make consuming and analyzing audit entries easier. Learn about new improvements that increase the performance of analyzing audit entries.
Speakers
avatar for Ann Wilkerson

Ann Wilkerson

Software Developer, IBM
Ann Wilkerson is the technical team lead for Navigator for i and a developer for IBM i Services.
Wednesday May 21, 2025 3:45pm - 4:45pm PDT
Room 8 1150 Magic Way, Anaheim, CA 92802

5:00pm PDT

IBM i Security with an SQL Chaser - Round 3
Wednesday May 21, 2025 5:00pm - 6:00pm PDT
In this award-winning session, be prepared to hear Scott Forstie and Carol Woodbury shake up the world of IBM i Security, mixing up yet another set of SQL concoctions to bedazzle the otherwise boring world of IBM i Security. This menu includes examples of using SQL to find vulnerabilities in your code (aka penetration testing) as well as new (but practical!) ways to use SQL services to discover and fix your security out your current processes that have reached their ‘consume by’ date. And, of course, be prepared to be a bit shaken (but not stirred).
 
Speakers
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco Systems
With over 30 years' experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →
avatar for Scott Forstie

Scott Forstie

STSM, Db2 for i Architect, IBM
Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Architect. He has worked on IBM operating system development since joining IBM in 1989.Scott is a frequently published author, speaker at industry events... Read More →
Wednesday May 21, 2025 5:00pm - 6:00pm PDT
Room 8 1150 Magic Way, Anaheim, CA 92802
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -